Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
df5c4e4e78597f50f22194b647f0271a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df5c4e4e78597f50f22194b647f0271a.exe
Resource
win10v2004-20240226-en
General
-
Target
df5c4e4e78597f50f22194b647f0271a.exe
-
Size
80KB
-
MD5
df5c4e4e78597f50f22194b647f0271a
-
SHA1
a2a7e00229cba5947094c2cb9e3775f5a02ecdbb
-
SHA256
44c63dcc93c7c22b2a7afc8a857317aa8139ed7eff29d72db5387b40d869e671
-
SHA512
941864a9e0e002ab9263281a83dd660830d4ac0ca4d8533e452892901ee9232b725a2a2537017cc40f368d282378a12f7e0ea28132242163084aef4ba1214a2a
-
SSDEEP
1536:wQmto47yF8e/O+TtSv6DhjFEA5n6qtvmzrRptAi858J8MGu1N3i6Enw:j4FMw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" df5c4e4e78597f50f22194b647f0271a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" huiuvod.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation df5c4e4e78597f50f22194b647f0271a.exe -
Executes dropped EXE 1 IoCs
pid Process 4356 huiuvod.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huiuvod = "C:\\Users\\Admin\\huiuvod.exe /f" huiuvod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huiuvod = "C:\\Users\\Admin\\huiuvod.exe /g" huiuvod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huiuvod = "C:\\Users\\Admin\\huiuvod.exe /r" huiuvod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huiuvod = "C:\\Users\\Admin\\huiuvod.exe /m" df5c4e4e78597f50f22194b647f0271a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huiuvod = "C:\\Users\\Admin\\huiuvod.exe /c" huiuvod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huiuvod = "C:\\Users\\Admin\\huiuvod.exe /k" huiuvod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huiuvod = "C:\\Users\\Admin\\huiuvod.exe /o" huiuvod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huiuvod = "C:\\Users\\Admin\\huiuvod.exe /s" huiuvod.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4560 df5c4e4e78597f50f22194b647f0271a.exe 4560 df5c4e4e78597f50f22194b647f0271a.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe 4356 huiuvod.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4560 df5c4e4e78597f50f22194b647f0271a.exe 4356 huiuvod.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4560 wrote to memory of 4356 4560 df5c4e4e78597f50f22194b647f0271a.exe 113 PID 4560 wrote to memory of 4356 4560 df5c4e4e78597f50f22194b647f0271a.exe 113 PID 4560 wrote to memory of 4356 4560 df5c4e4e78597f50f22194b647f0271a.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\df5c4e4e78597f50f22194b647f0271a.exe"C:\Users\Admin\AppData\Local\Temp\df5c4e4e78597f50f22194b647f0271a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\huiuvod.exe"C:\Users\Admin\huiuvod.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:4716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5d1b50e158a091390c64cf7015b4529e5
SHA146c3e08e7d943e94ead75882d3e480ea0dce58cd
SHA25647c5f5a03d80cb70b91f4f27aa55fd3ac559f5fcd9c69fcfbdfbf1d77187495b
SHA512bb3f1c608f38c7a9e10725d15dfdce24629d45eb83efc9ec37c9c8542f6457151f8e048392ae35070d2fe2ae0f349bc816207be3ebfb852408f274ef1e1d7b99